Vulnerability Description
A vulnerability was detected in SourceCodester Employee Task Management System 1.0. Impacted is an unknown function of the file /daily-attendance-report.php of the component GET Parameter Handler. The manipulation of the argument Date results in sql injection. The attack may be performed from remote. The exploit is now public and may be used.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Oretnom23 | Employee Task Management System | 1.0 |
Related Weaknesses (CWE)
References
- https://github.com/meifukun/Web-Security-PoCs/blob/main/Employee-Task-ManagementExploitThird Party Advisory
- https://vuldb.com/?ctiid.349729Permissions RequiredVDB Entry
- https://vuldb.com/?id.349729Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.768034Third Party AdvisoryVDB Entry
- https://www.sourcecodester.com/Product
FAQ
What is CVE-2026-3751?
CVE-2026-3751 is a vulnerability with a CVSS score of 4.7 (MEDIUM). A vulnerability was detected in SourceCodester Employee Task Management System 1.0. Impacted is an unknown function of the file /daily-attendance-report.php of the component GET Parameter Handler. The...
How severe is CVE-2026-3751?
CVE-2026-3751 has been rated MEDIUM with a CVSS base score of 4.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-3751?
Check the references section above for vendor advisories and patch information. Affected products include: Oretnom23 Employee Task Management System.